The adoption period finished sone time ago with strong consensus to adopt.
  Authors will want to upload their latest version.

tim


On Mon, Sep 11, 2017 at 2:52 PM, Marek Vavruša <mvavr...@cloudflare.com>
wrote:

> I support the adoption of this document. Was there a discussion of any
> actual downsides besides "I'd like to know if it's stale" and
> monitoring?
>
> On Mon, Sep 11, 2017 at 11:11 AM, Bob Harold <rharo...@umich.edu> wrote:
> >
> > On Thu, Sep 7, 2017 at 10:07 PM, Mark Andrews <ma...@isc.org> wrote:
> >>
> >>
> >> Part of the problem is that we have one TTL value for both freshness
> >> and don't use beyond.
> >>
> >> This is fixable.  It is possible to specify two timer values.  It
> >> does require adding signaling between recursive servers and
> >> authoritative servers, on zone transfers and update requests.
> >>
> >> You basically add a additional timer field to every record immediately
> >> after the TTL field.  This is only returned if the client has
> >> signalled support for the extended field, I suggest using the last
> >> DNS header bit for this as you can determine how you will parse the
> >> response base on whether the bit is set in the response or not.
> >> This field is used to expire records from the cache and its value
> >> is set to the TTL field if the server has learnt the record from
> >> server that doesn't support the extension.
> >>
> >> The existing TTL field is used for freshness checking.  When a query
> >> comes in after that value has expired a freshness check is performed
> >> similar to the existing prefetches that happen today.  A TTL of 1
> >> is returned unless the original TTL was 0 in which case 0 is returned.
> >>
> >> New client - new recursive server - new authservers
> >>
> >>         example.com. 300 86400 IN A 1.2.3.4
> >>
> >>                 +300 seconds
> >>
> >>         example.com. 1 86100 IN A 1.2.3.4
> >>          (background query is in process)
> >>
> >> Old client - new recursive server - new authservers
> >>
> >>         example.com. 300 IN A 1.2.3.4
> >>
> >>                 +300 seconds
> >>
> >>         example.com. 1 IN A 1.2.3.4
> >>          (background query is in process)
> >>
> >> New client - new recusive server - old auth servers
> >>
> >>         example.com. 300 300 IN A 1.2.3.4
> >>
> >>                 +300 seconds
> >>          (record has expired from cache,
> >>           new query is performed)
> >>
> >>         example.com. 300 300 IN A 1.2.3.4
> >>
> >> For UPDATE a replacement opcode would be cleanest way to signal the
> >> new format is being used.  NOTIMP should be returned by servers
> >> that don't support the new opcode.
> >>
> >> There will be a few broken servers that just echo back the new
> >> header bit.
> >>
> >> This way the authoritative servers still control how long records
> >> are stored for.  Dead servers will get a little bit of traffic until
> >> the the refresh completes.  If the authorative servers are under
> >> attack the clients still see a answer.
> >>
> >> The alternative is to perform the refresh query and if it fails to
> >> complete within X milliseconds return the cached data rather than
> >> returning the cached data and doing the refresh in the background.
> >>
> >> Mark
> >>
> >> --
> >> Mark Andrews, ISC
> >> 1 Seymour St., Dundas Valley, NSW 2117, Australia
> >> PHONE: +61 2 9871 4742                 INTERNET: ma...@isc.org
> >
> >
> > While I like the idea of a  "don't use beyond" timer, I think it will be
> a
> > very long time before it is widely deployed (and actually configured by
> zone
> > owners), and therefore won't solve our immediate need.  It would be
> great if
> > clients could opt-in, but again I don't see that happening anytime
> soon.  So
> > I would start with resolver-operators deciding what seems best for their
> > clients (which is hat is happening whether we like it or not).  Adding
> > client opt-out/opt-in would be good.   Signalling to say that a response
> is
> > stale would be good.  Adding the second timer (both per-RR and as a zone
> > default value, like TTL is handled) would be good.
> >
> > On a related note - the SOA "expire" timer tells a slave how long to keep
> > serving "stale" zone data when the master cannot be reached.  Would that
> be
> > a reasonable default value for how long a resolver should serve "stale"
> data
> > when the authoritative servers cannot be reached?   (Currently I think
> most
> > people set a very high value compared to the TTL.)
> >
> > --
> > Bob Harold
> >
> >
> >
> > _______________________________________________
> > DNSOP mailing list
> > DNSOP@ietf.org
> > https://www.ietf.org/mailman/listinfo/dnsop
> >
>
> _______________________________________________
> DNSOP mailing list
> DNSOP@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsop
>
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to